Bloodhound.Exploit.109 is a heuristic detection for Apple QuickTime RTSP URI Remote Buffer Overflow Vulnerability. An attacker who exploits this vulnerability could perform a denial-of-service attack against a vulnerable version of QuickTime, or potentially execute arbitrary code with the privileges of the logged-on user. The exploit is triggered by opening a specially-crafted QTL file.

Applies to: Apple QuickTime Player 7.1.3

Files that are detected as Bloodhound.Exploit.109 may be malicious. We suggest that you submit to Symantec Security Response any files that are detected as Bloodhound.Exploit.109. For instructions on how to do this using Scan and Deliver, read How to submit a file to Symantec Security Response using Scan and Deliver.

Logged

.....The greatest changes occur in their country without their cooperation. They are not even aware of precisely what has taken place. They suspect it; they have heard of the event by chance. More than that, they are unconcerned with the fortunes of their village, the safety of their streets, the fate of their church and its vestry. They think that such things have nothing to do with them, that they belong to a powerful stranger called “the government.” They enjoy these goods as tenants, without a sense of ownership, and never give a thought to how they might be improved.....

Brendhan, I have done a few like that as well, it is depressing when you find hopelessness amongst bees as they are generally very happy little critters.

Shbs are just plain disgusting and amazing little beetles at the same time. I find them in every hive I believe I have ever removed and even have seen them in swarm clusters after I had dropped them in my hightech boxes.

If my memory serves me right and I am 1/2 senile, I think, shbs can sense a honeybee colony from over 5 miles away.

kathyp was correct. There was an exploit made on my server. The exploit was made through a vulnerability in the coppermine gallery software. That has since been remedied. The server was not compromised. Just the coppermine software.

It was done by placing a fake picture file in the coppermine code and then hiding it in an iframe html code. The exploit was called 45563131x.jpg. Which was never a picture but a script. The script was placed about 12 hours before kathyp pointed it out.

It has been completely removed from the site. If you continue to have issues please let me know.

Sincerely,Brendhan

Logged

The status is not quo. The world is a mess and I just need to rule it. Dr. Horrible